by @mweinelt Activity log
- Created automatic suggestion
- @mweinelt accepted
- @mweinelt published on GitHub
CoreDNS ACL Bypass
CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. This issue has been patched in version 1.14.2.
References
-
https://github.com/coredns/coredns/security/advisories/GHSA-c9v3-4pv7-87pr x_refsource_CONFIRM
-
https://github.com/coredns/coredns/releases/tag/v1.14.2 x_refsource_MISC
Affected products
- ==< 1.14.2
Package maintainers
-
@rushmorem Rushmore Mushambi <rushmore@webenchanter.com>
-
@DeltaEvo Duarte David <deltaduartedavid@gmail.com>
-
@rtreffer Rene Treffer <treffer+nixos@measite.de>